Paper 2012/011

Biclique Attack of the Full ARIA-256

Shao-zhen Chen Tian-min Xu

Abstract

In this paper, combining the biclique cryptanalysis with the MITM attack, we present the first key recovery method for the full ARIA-256 faster than brute-force. The attack requires $2^{80}$ chosen plaintexts, and the time complexity is about $2^{255.2}$ full-round ARIA encryptions in the processing phase.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
Block CipherARIA-256Biclique structure
Contact author(s)
campensparky @ gmail com
History
2012-01-10: received
Short URL
https://ia.cr/2012/011
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/011,
      author = {Shao-zhen Chen Tian-min Xu},
      title = {Biclique Attack of the Full ARIA-256},
      howpublished = {Cryptology ePrint Archive, Paper 2012/011},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/011}},
      url = {https://eprint.iacr.org/2012/011}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.